Foundational Trust for IoT and Resource Constrained Devices
Vulnerabilities in modern computing, communications, and control systems allow cyber-attackers, who are increasingly sophisticated and relentless in their efforts, access to valuable, proprietary, personal, and sometimes, dangerous information. At the same time, new market segments, like the Internet of Things (IoT), are driving innovative architectures and creating solutions with challenging power, security, resource, and other constraints.